English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4242893      在线人数 : 802
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    碩士論文 [101/101]
    期刊論文 [78/111]
    專書 [0/1]
    國科會研究報告 [14/30]

    类别统计

    近3年内发表的文件:0(0.00%)
    含全文笔数:67(55.37%)

    文件下载次数统计
    下载大于0次:67(100.00%)
    下载大于100次:67(100.00%)
    全文下载总次数:22464(22.08%)

    最后更新时间: 2024-12-04 17:15


    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目51-100 / 121. (共3页)
    << < 1 2 3 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2011-07 Investigating Dropout Intention of Virtual Community Members by Viewpoint of Serious Leisure. Lin, Sheng-cheng and Yang, Yin-lin.; 林盛程
    2009 Investigating the processes and factors of cross-disciplinary knowledge integration in academic entrepreneurship. Lin, F.R., Lin, S.C. and Tsai, C.M.; 林盛程
    2005-08-22 A limited flooding scheme for mobile ad hoc networks Chiang, T.-C.ac , Wu, P.-Y.b, Huang, Y.-M.a
    2005-08-22 A limited flooding scheme for mobile ad hoc networks Chiang, T.-C.ac , Wu, P.-Y.b, Huang, Y.-M.a
    2004-03-28 Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme?? Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2009 Multi-tree broadcast in peer-to-peer networks Lin, J.-W.
    2004-03-29 Multicast routing representation in Ad Hoc networks using fuzzy Petri nets Chiang, T.-C. , Huang, Y.-M.
    2012 A multiclass classification tool using cloud computing architecture Shen, C.-P.a , Liu, C.-H.a, Lin, F.-S.d, Lin, H.b, Huang, C.-Y.F.e, Kao, C.-Y.ac, Lai, F.ac, Lin, J.-W.f
    2006-04-18 A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Liu, C.-H.a , Chiang, T.-C.b , Huang, Y.-M.a
    2008 A Novel Approach to Enhance the Synthetic Aperture Imaging 謝新銘、余心淳、許郁清
    2009 Novel control for ambulation function restoration in a non-invasive functional electrical stimulation system Hsieh, J.-C.a, Chen, C.-C.a, Chen, S.-C.b, Chen, Y.-L.c, Li, Y.-C.d, Shih, Y.-Y.d, Kuo, T.-S.d
    2010 Novel design of interactive caption and recognition postures within the wearable and non-vision system over wireless sensor network Huang, W.T.a , Hung, C.N.b , Tuan, C.C.b , Chen, C.C.c , Chang, Y.J.c , Chen, Y.Y.d
    2006-11-03 A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery?? Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S.
    2006-10-03 A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery?? Wu, Z.Y., Jeng, F.G., Chen, T.S.
    2006-08-16 A novel key management and access control scheme for mobile agent?? Pan, J.-Y., Chen, T.-L., Chen, T.-S.
    2004-09-28 A novel key management scheme for dynamic access control in a user hierarchy?? Chen, T.-S., Chung, Y.-F., Tian, C.-S.
    2010-03-17 A novel time-bound hierarchical key assignment scheme for mobile agent Liu, C.-H.a, Chung, Y.-F.b, Jhuo, J.-D.c, Chen, T.-S.c , Wang, S.-D.a
    2010 A novel time-bound hierarchical key assignment scheme for mobile agent. Liu, C.H., Chung, Y.F., Jhuo, J.D., Chen, T.S. Wang, S.D.; 陳澤雄
    2005-12-06 On scalability and mobility management of hierarchical large-scale ad hoc networks Tsai, M.-H.b , Chiang, T.-C.ac , Huang, Y.-M.
    2010-12 One-Dimensional Phase Retrieval using Prior Discrete Fourier Transform. 余心淳、謝新銘、葉宏偉
    2005-08-22 A partition network model for ad hoc networks Chiang, T.-C.ac , Tsai, H.-M.b, Huang, Y.-M.a
    2002-10-28 A proxy-protected proxy signature scheme based on elliptic curve cryptosystem?? Chen, T.-S., Liu, T.-P., Chung, Y.-F.
    2011-06 &quot;Innovation Network in Taiwan Telecommunication Industry Based upon Social Network Perspective. Tseng, Chun-yao, Lin, Sheng-cheng and Jiang, Tz-lin.; 林盛程
    2008 Rearrange broadcast schedules on DHT-based peer-to-peer networks Lin, J.-W.
    2011-07 The Relationship between Vacation Motives and Online Travel Information Search Behavior in Pre-Trip Context: A Case of Inbound Travelers in Taiwan. Kimsuwan,Apithep., Cheng, Fei-Fei and Wu, Chin-Shan .; 吳金山
    2012-03-26 A reliable dynamic user-remote password authentication scheme over insecure network Wu, Z.-Y.a , Chiang, D.-L.b, Lin, T.-C.b, Chung, Y.-F.c, Chen, T.-S.
    2010-07-20 A rendezvous-location based multicast secure communication in ad hoc networks Chiang, T.-C.a , Lin, H.-Y.b , Chang, J.-L.c
    2010-07-20 A rendezvous-location based multicast secure communication in ad hoc networks Chiang, T.-C.a , Lin, H.-Y.b , Chang, J.-L.c
    2009 An RFID-based software agent framework on pervasive health service Yeh, K.-C.a, Chen, Y.-C.b, Chen, C.-C.c, Chen, R.-S.
    2008 Safety Design for Artificial Marble Products 張育仁; Wang, W. P., C. S. Chang and Y. J. Chang
    2012-03-26 Secure authentication scheme for supporting healthcare in wireless sensor networks Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B
    2009 Seismic image reconstruction based on an approach of prior knowledge. Shieh, H. M., Yu, H. C., Hsu, Y. C. and Ye, M. C.; 余心淳
    2003-08-27 A Sequence and Topology encoding for Multicast Protocol (STMP) in Wireless Ad Hoc Networks Huang, Y.-M.a, Chiang, T.-C.b
    2010-12-17 The study of secure agent-based scheme on health information systems Chen, T.-L. , Cheng, S.-H., Liu, C.-H., Fang, T.-Y., Chen, T.-S., Chen, C.-S.
    2010-12 The Study of Secure Agent-based Scheme on Health Information Systems. Chen,T. L., Cheng, S. H., Liu, C. H., Fang, T.Y., Chen, T. S. and Chen, C. S.; 陳澤雄
    2006-12-04 Threshold signature scheme resistible for conspiracy attack?? Chung, Y.F., Liu, C.-H., Lai, F., Chen, T.-S.
    2013-11-10 Ultra-fast epileptic seizure detection using EMD based on multichannel electroencephalogram Chen, W.; Lam, Y.-Y.; Shen, C.-P.; Sung, H.-Y.; Lin, J.-W.; Chiu, M.-J.; Lai, F.
    2009 《Unicode電腦漢字異體字字典》編纂過程所遭遇的困難和解決方法 袁國華、林正偉、詹今慧、趙苑夙
    2006-07-04 Using an interpolation algorithm for VCR like functions in multimedia communications Tsai, H.-M.a , Chiang, T.-C.b , Huang, Y.-M.a
    2006-07-04 Using an interpolation algorithm for VCR like functions in multimedia communications Tsai, H.-M.a , Chiang, T.-C.b , Huang, Y.-M.a
    2009 Using the Heuristic Algorithm to Solve the Economic Lot Scheduling Problem with Returns 張育仁; Chang, Y. J. and C. Y. Cheng
    2011-06-28 Virtual B-tree topology: A self-routing topology for a wireless sensor network Wang, S.-Y.ab , Chiang, T.-C.c , Yang, C.-S.d
    2010 Web-based healthcare Hand Drawing Management System Hsieh, S.-L.a , Weng, Y.-C.b , Chen, C.-H.c, Hsu, K.-P.d , Lin, J.-W.e , Lai, F.f
    2010-09 Web-based Healthcare Hand Drawing Management System. Hsieh, Sheau-Ling, Weng, Yung-Chin,g, Chen, Chi-Huang, Hsu, Kai-Ping, Lin, Jeng-Weiand Lai, Feipei.; 林正偉
    2010-05-21 Wireless Bluetooth communications combine with secure data transmission using ECDH and conference key agreements Lin, H.-Y.a , Chiang, T.-C.b
    2010-05-21 Wireless Bluetooth communications combine with secure data transmission using ECDH and conference key agreements Lin, H.-Y.a , Chiang, T.-C.b
    2009 Wireless Bluetooth Communications Combine With Secure Data Transmission using ECDH and Conference Key Agreements. Hua, Yi Lin and Chiang, Tzu-Chiang.; 姜自強
    2008 一個求解有重製狀況經濟批量排程問題的簡單啟發式方法 張育仁、姚銘忠
    2011-06 主動式無線標籤技術於資訊化顧客臨櫃服務管理系統上之應用與實作。 余心淳、吳欣蓉、陳?瑄、?協信
    2010 以區域分割為基礎的叢集群播協定於隨意無線行動通訊網路之應用 林仕偉、姜自強

    显示项目51-100 / 121. (共3页)
    << < 1 2 3 > >>
    每页显示[10|25|50]项目

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈